A. Adams and M. A. Sasse, Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999.

A. Brown, A review of the tip-of-the-tongue experience, Psychological bulletin, vol.109, issue.2, pp.204-223, 1991.

R. Brown and D. Mcneill, The tip of the tongue phenomenon, Journal of Verbal Learning and Verbal Behavior, vol.5, issue.4, pp.325-337, 1966.

M. Burnett and D. ). Ed, , 2006.

Y. L. Chen, W. C. Ku, Y. C. Yeh, and D. M. Liao, A simple text-based shoulder surfing resistant graphical password scheme, IEEE 2nd International Symposium on Next-Generation Electronics, pp.161-164, 2013.

S. Collider, How secure is my, 2016.

D. Crystal, Dictionary of linguistics and phonetics, vol.30, 2011.

D. Davis, F. Monrose, and M. Reiter, On user choice in graphical password schemes, Proceedings of The 13th USENIX Security Symposium, pp.151-164, 2004.

. Encyclopedia, Tip-of-the-tongue phenomenon-dictionary definition of tip-of-the-tongue phenomenon, 2016.

M. Haque and B. Imam, A new graphical password: Combination of recall & recognition based approach, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol.8, issue.2, pp.320-324, 2014.

M. Haque, B. Imam, and N. Ahmad, 2-round hybrid password scheme, International Journal of Computer Engineering and Technology (IJCET, vol.3, issue.2, pp.579-587, 2012.

P. Mokal and R. Devikar, A survey on shoulder surfing resistant text based graphical password schemes, International Journal of Science and Research (IJSR), vol.3, issue.4, pp.747-750, 2014.

, Password strength checker, 2017.

. Accessed, , 2017.

K. Rao and A. Yalamanchili, Novel shoulder-surfing resistant authentication schemes using text-graphical passwords, International Journal of Information and Network Security, vol.1, issue.3, pp.163-170, 2012.

B. Schwartz and J. Metcalfe, Tip-of-the-tongue (TOT) states: Retrieval, behaviour, and experience, Memory & Cognition, vol.39, issue.5, pp.737-749, 2011.

R. Shepard, Recognition memory for words, sentences and pictures, Journal of Verbal Learning and Verbal Behaviour, vol.6, pp.156-163, 1967.

M. Sreelatha, M. Shashi, M. Anirudh, M. Ahamer, and V. Manoj-kumar, Authentication schemes for session passwords using color and images, International Journal of Network Security & Its Applications, vol.3, issue.3, pp.111-119, 2011.

P. Van-oorschot and J. Thorpe, Exploiting predictability in click-based graphical passwords, Journal of Computer Security, vol.19, issue.4, pp.669-702, 2011.

P. C. Van-oorschot and T. Wan, Twostep: An authentication method combining text and graphical passwords, International Conference on E-Technologies pp, pp.233-239, 2009.

J. Vorster and R. Van-heerden, A study of perceptions of graphical passwords

, Accessed 2, 2016.

J. Yan, A. Blackwell, R. Anderson, and A. Grant, Password memorability and security: Empirical results, IEEE Privacy & Security, vol.2, issue.5, pp.25-31, 2004.

Y. Zhang, F. Monrose, and M. K. Reiter, The security of modern password expiration: An algorithmic framework and empirical analysis, Proceedings of the 17th ACM conference on Computer and communications security, pp.176-186, 2010.

H. Zhao and X. Li, S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme, Advanced Information Networking and Applications Workshops, vol.2, pp.467-472, 2007.